Ubuntu 7036 Published by

Ubuntu has published security notices addressing critical flaws in several popular libraries used across many operating system versions. The pyasn1 update resolves a specific issue where decoding malformed certificates could exhaust system resources and crash the server. ImageMagick received a larger set of patches because attackers might exploit memory handling errors to execute arbitrary code or cause denial of service on supported systems. Finally, users must also upgrade Pillow and Dovecot to fix vulnerabilities involving memory safety issues and authentication bypasses found on various supported platforms including older LTS releases.

[USN-8134-1] pyasn1 vulnerabilities
[USN-8127-1] ImageMagick vulnerabilities
[USN-8135-1] Pillow vulnerabilities
[USN-8136-1] Dovecot vulnerabilities




[USN-8134-1] pyasn1 vulnerabilities


==========================================================================
Ubuntu Security Notice USN-8134-1
March 30, 2026

pyasn1 vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS

Summary:

Several security issues were fixed in pyasn1.

Software Description:
- pyasn1: ASN.1 library for Python

Details:

It was discovered that pyasn1 could exhaust system resources when
attempting to decode a malformed certificate. An attacker could
possibly use this to cause a denial of service. (CVE-2026-23490)

Kevin Tu discovered that pyasn1 could exhaust system resources via
uncontrolled recursion when attempting to decode malicously-crafted
certificates. An attacker could possibly use this to cause a denial of
service. (CVE-2026-30922)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 20.04 LTS
pypy-pyasn1 0.4.2-3ubuntu0.20.04.1~esm1
Available with Ubuntu Pro
python-pyasn1 0.4.2-3ubuntu0.20.04.1~esm1
Available with Ubuntu Pro
python3-pyasn1 0.4.2-3ubuntu0.20.04.1~esm1
Available with Ubuntu Pro

Ubuntu 18.04 LTS
pypy-pyasn1 0.4.2-3ubuntu0.18.04.1~esm1
Available with Ubuntu Pro
python-pyasn1 0.4.2-3ubuntu0.18.04.1~esm1
Available with Ubuntu Pro
python3-pyasn1 0.4.2-3ubuntu0.18.04.1~esm1
Available with Ubuntu Pro

Ubuntu 16.04 LTS
pypy-pyasn1 0.1.9-1ubuntu0.1~esm1
Available with Ubuntu Pro
python-pyasn1 0.1.9-1ubuntu0.1~esm1
Available with Ubuntu Pro
python3-pyasn1 0.1.9-1ubuntu0.1~esm1
Available with Ubuntu Pro

Ubuntu 14.04 LTS
python-pyasn1 0.1.7-1ubuntu2.1+esm1
Available with Ubuntu Pro
python3-pyasn1 0.1.7-1ubuntu2.1+esm1
Available with Ubuntu Pro

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-8134-1
CVE-2026-23490, CVE-2026-30922



[USN-8127-1] ImageMagick vulnerabilities


==========================================================================
Ubuntu Security Notice USN-8127-1
March 30, 2026

imagemagick vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS

Summary:

Several security issues were fixed in ImageMagick.

Software Description:
- imagemagick: Image manipulation programs and library

Details:

It was discovered that ImageMagick did not properly process certain tags
prior to an image being loaded. An attacker could possibly use this issue
to cause ImageMagick to crash, resulting in a denial of service.
(CVE-2026-23952)

It was discovered that ImageMagick did not properly handle temporary file
creation failures. An attacker could possibly use this issue to cause
ImageMagick to crash, resulting in a denial of service. (CVE-2026-25795)

It was discovered that ImageMagick did not properly manage memory under
certain conditions. An attacker could possibly use this issue to cause
ImageMagick to consume resources, resulting in a denial of service.
(CVE-2026-25796)

It was discovered that ImageMagick incorrectly handled certain specially
crafted image files. An attacker could possibly use this issue to cause
ImageMagick to crash, resulting in a denial of service. (CVE-2026-25798)

It was discovered that ImageMagick did not properly validate certain YUV
sampling factors. An attacker could possibly use this issue to cause
ImageMagick to crash, resulting in a denial of service. (CVE-2026-25799)

It was discovered that ImageMagick incorrectly handled certain specially
crafted image files. An attacker could possibly use this issue to cause
ImageMagick to crash, resulting in a denial of service. This issue only
affected Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS,
Ubuntu 22.04 LTS and Ubuntu 24.04 LTS. (CVE-2026-25970)

It was discovered that ImageMagick incorrectly managed memory when handling
certain specially crafted image files. An attacker could possibly use this
issue to cause ImageMagick to consume resources, resulting in a denial of
service. (CVE-2026-25988)

It was discovered that ImageMagick incorrectly handled certain crafted image
profiles. An attacker could possibly use this issue to cause ImageMagick
to consume available resources, resulting in a denial of service.
(CVE-2026-26066)

It was discovered that ImageMagick incorrectly handled large image profiles
when encoding PNG images. An attacker could use this issue to cause
ImageMagick to crash, resulting in a denial of service, or possibly execute
arbitrary code. (CVE-2026-30883)

Kamil Frankowicz discovered that ImageMagick incorrectly handled certain XML
data. An attacker could possibly use this issue to cause ImageMagick to crash,
resulting in a denial of service. (CVE-2026-32636)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 24.04 LTS
imagemagick-6.q16 8:6.9.12.98+dfsg1-5.2ubuntu0.1~esm8
Available with Ubuntu Pro
imagemagick-6.q16hdri 8:6.9.12.98+dfsg1-5.2ubuntu0.1~esm8
Available with Ubuntu Pro
libimage-magick-q16-perl 8:6.9.12.98+dfsg1-5.2ubuntu0.1~esm8
Available with Ubuntu Pro
libimage-magick-q16hdri-perl 8:6.9.12.98+dfsg1-5.2ubuntu0.1~esm8
Available with Ubuntu Pro
libmagick++-6.q16-9t64 8:6.9.12.98+dfsg1-5.2ubuntu0.1~esm8
Available with Ubuntu Pro
libmagick++-6.q16hdri-9t64 8:6.9.12.98+dfsg1-5.2ubuntu0.1~esm8
Available with Ubuntu Pro
libmagickcore-6-headers 8:6.9.12.98+dfsg1-5.2ubuntu0.1~esm8
Available with Ubuntu Pro
libmagickcore-6.q16-7-extra 8:6.9.12.98+dfsg1-5.2ubuntu0.1~esm8
Available with Ubuntu Pro
libmagickcore-6.q16-7t64 8:6.9.12.98+dfsg1-5.2ubuntu0.1~esm8
Available with Ubuntu Pro
libmagickcore-6.q16hdri-7-extra 8:6.9.12.98+dfsg1-5.2ubuntu0.1~esm8
Available with Ubuntu Pro
libmagickcore-6.q16hdri-7t64 8:6.9.12.98+dfsg1-5.2ubuntu0.1~esm8
Available with Ubuntu Pro
libmagickwand-6.q16-7t64 8:6.9.12.98+dfsg1-5.2ubuntu0.1~esm8
Available with Ubuntu Pro
libmagickwand-6.q16hdri-7t64 8:6.9.12.98+dfsg1-5.2ubuntu0.1~esm8
Available with Ubuntu Pro

Ubuntu 22.04 LTS
imagemagick-6.q16 8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5+esm9
Available with Ubuntu Pro
imagemagick-6.q16hdri 8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5+esm9
Available with Ubuntu Pro
libimage-magick-q16-perl 8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5+esm9
Available with Ubuntu Pro
libimage-magick-q16hdri-perl 8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5+esm9
Available with Ubuntu Pro
libmagick++-6.q16-8 8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5+esm9
Available with Ubuntu Pro
libmagick++-6.q16hdri-8 8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5+esm9
Available with Ubuntu Pro
libmagickcore-6.q16-6 8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5+esm9
Available with Ubuntu Pro
libmagickcore-6.q16-6-extra 8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5+esm9
Available with Ubuntu Pro
libmagickcore-6.q16hdri-6 8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5+esm9
Available with Ubuntu Pro
libmagickcore-6.q16hdri-6-extra 8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5+esm9
Available with Ubuntu Pro
libmagickwand-6.q16-6 8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5+esm9
Available with Ubuntu Pro
libmagickwand-6.q16hdri-6 8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5+esm9
Available with Ubuntu Pro

Ubuntu 20.04 LTS
libimage-magick-q16-perl 8:6.9.10.23+dfsg-2.1ubuntu11.11+esm9
Available with Ubuntu Pro
libimage-magick-q16hdri-perl 8:6.9.10.23+dfsg-2.1ubuntu11.11+esm9
Available with Ubuntu Pro
libmagickcore-6.q16-6 8:6.9.10.23+dfsg-2.1ubuntu11.11+esm9
Available with Ubuntu Pro
libmagickcore-6.q16-6-extra 8:6.9.10.23+dfsg-2.1ubuntu11.11+esm9
Available with Ubuntu Pro
libmagickcore-6.q16hdri-6 8:6.9.10.23+dfsg-2.1ubuntu11.11+esm9
Available with Ubuntu Pro
libmagickcore-6.q16hdri-6-extra 8:6.9.10.23+dfsg-2.1ubuntu11.11+esm9
Available with Ubuntu Pro

Ubuntu 18.04 LTS
imagemagick-6.q16 8:6.9.7.4+dfsg-16ubuntu6.15+esm11
Available with Ubuntu Pro
imagemagick-6.q16hdri 8:6.9.7.4+dfsg-16ubuntu6.15+esm11
Available with Ubuntu Pro
libimage-magick-q16-perl 8:6.9.7.4+dfsg-16ubuntu6.15+esm11
Available with Ubuntu Pro
libimage-magick-q16hdri-perl 8:6.9.7.4+dfsg-16ubuntu6.15+esm11
Available with Ubuntu Pro
libmagick++-6.q16-7 8:6.9.7.4+dfsg-16ubuntu6.15+esm11
Available with Ubuntu Pro
libmagick++-6.q16hdri-7 8:6.9.7.4+dfsg-16ubuntu6.15+esm11
Available with Ubuntu Pro
libmagickcore-6.q16-3 8:6.9.7.4+dfsg-16ubuntu6.15+esm11
Available with Ubuntu Pro
libmagickcore-6.q16-3-extra 8:6.9.7.4+dfsg-16ubuntu6.15+esm11
Available with Ubuntu Pro
libmagickcore-6.q16hdri-3 8:6.9.7.4+dfsg-16ubuntu6.15+esm11
Available with Ubuntu Pro
libmagickcore-6.q16hdri-3-extra 8:6.9.7.4+dfsg-16ubuntu6.15+esm11
Available with Ubuntu Pro
libmagickwand-6.q16-3 8:6.9.7.4+dfsg-16ubuntu6.15+esm11
Available with Ubuntu Pro
libmagickwand-6.q16hdri-3 8:6.9.7.4+dfsg-16ubuntu6.15+esm11
Available with Ubuntu Pro

Ubuntu 16.04 LTS
imagemagick-6.q16 8:6.8.9.9-7ubuntu5.16+esm19
Available with Ubuntu Pro
libimage-magick-q16-perl 8:6.8.9.9-7ubuntu5.16+esm19
Available with Ubuntu Pro
libmagick++-6.q16-5v5 8:6.8.9.9-7ubuntu5.16+esm19
Available with Ubuntu Pro
libmagickcore-6.q16-2 8:6.8.9.9-7ubuntu5.16+esm19
Available with Ubuntu Pro
libmagickcore-6.q16-2-extra 8:6.8.9.9-7ubuntu5.16+esm19
Available with Ubuntu Pro
libmagickwand-6-headers 8:6.8.9.9-7ubuntu5.16+esm19
Available with Ubuntu Pro
libmagickwand-6.q16-2 8:6.8.9.9-7ubuntu5.16+esm19
Available with Ubuntu Pro

Ubuntu 14.04 LTS
imagemagick 8:6.7.7.10-6ubuntu3.13+esm20
Available with Ubuntu Pro
imagemagick-common 8:6.7.7.10-6ubuntu3.13+esm20
Available with Ubuntu Pro
libmagick++5 8:6.7.7.10-6ubuntu3.13+esm20
Available with Ubuntu Pro
libmagickcore5 8:6.7.7.10-6ubuntu3.13+esm20
Available with Ubuntu Pro
libmagickcore5-extra 8:6.7.7.10-6ubuntu3.13+esm20
Available with Ubuntu Pro
libmagickwand5 8:6.7.7.10-6ubuntu3.13+esm20
Available with Ubuntu Pro
perlmagick 8:6.7.7.10-6ubuntu3.13+esm20
Available with Ubuntu Pro

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-8127-1
CVE-2026-23952, CVE-2026-25795, CVE-2026-25796, CVE-2026-25798,
CVE-2026-25799, CVE-2026-25970, CVE-2026-25988, CVE-2026-26066,
CVE-2026-30883, CVE-2026-32636



[USN-8135-1] Pillow vulnerabilities


==========================================================================
Ubuntu Security Notice USN-8135-1
March 31, 2026

pillow vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS

Summary:

Several security issues were fixed in Pillow.

Software Description:
- pillow: Python Imaging Library

Details:

It was discovered that Pillow did not correctly handle reading J2K files,
which could lead to an out-of-bounds read vulnerability. If a user or
automated system were tricked into opening a specially crafted file, an
attacker could possibly use this issue to cause a denial of service. This
issue only affected Ubuntu 16.04 LTS. (CVE-2021-25287, CVE-2021-25288)

It was discovered that Pillow did not correctly handle certain integer
arithmetic, which could lead to a buffer overflow. An attacker could
possibly use this issue to cause a denial of service or execute arbitrary
code. This issue only affected Ubuntu 14.04 LTS. (CVE-2021-25290)

It was discovered that Pillow did not correctly perform bounds checking
for certain operations. An attacker could possibly use this issue to
cause a denial of service. This issue only affected Ubuntu 14.04 LTS
and Ubuntu 16.04 LTS. (CVE-2021-28675, CVE-2021-28676, CVE-2021-28677)

It was discovered that Pillow did not correctly handle certain memory
operations. An attacker could possibly use this issue to cause a denial
of service. (CVE-2023-44271)

It was discovered that Pillow did not correctly sanitize certain inputs.
An attacker could possibly use this issue to execute arbitrary code.
(CVE-2023-50447)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.04 LTS
python-pil 5.1.0-1ubuntu0.8+esm2
Available with Ubuntu Pro
python3-pil 5.1.0-1ubuntu0.8+esm2
Available with Ubuntu Pro

Ubuntu 16.04 LTS
python-pil 3.1.2-0ubuntu1.6+esm3
Available with Ubuntu Pro
python3-pil 3.1.2-0ubuntu1.6+esm3
Available with Ubuntu Pro

Ubuntu 14.04 LTS
python-pil 2.3.0-1ubuntu3.4+esm5
Available with Ubuntu Pro
python3-pil 2.3.0-1ubuntu3.4+esm5
Available with Ubuntu Pro

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-8135-1
CVE-2021-25287, CVE-2021-25288, CVE-2021-25290, CVE-2021-28675,
CVE-2021-28676, CVE-2021-28677, CVE-2023-44271, CVE-2023-50447



[USN-8136-1] Dovecot vulnerabilities


==========================================================================
Ubuntu Security Notice USN-8136-1
March 31, 2026

dovecot vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 25.10
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS

Summary:

Several security issues were fixed in Dovecot.

Software Description:
- dovecot: IMAP and POP3 email server

Details:

It was discovered that Dovecot incorrectly handled invalid base64 SASL data.
An attacker could possibly use this issue to cause a denial of service. This
issue only affected Ubuntu 25.10. (CVE-2025-59028)

It was discovered that Dovecot script decode2text.sh incorrectly handled zip
files. An attacker could possibly use this issue to obtain sensitive
information. (CVE-2025-59031)

It was discovered that Dovecot incorrectly handled certain AUTHENTICATE
requests. An attacker could possibly use this issue to cause a denial of
service. (CVE-2025-59032)

It was discovered that Dovecot incorrectly handled certain SQL based
authentication. An attacker could possibly use this issue to bypass
authentication. This issue only affected Ubuntu 25.10. (CVE-2026-24031)

It was discovered that Dovecot incorrectly handled certain LDAP based
authentication. An attacker could possibly use this issue to bypass
restrictions and allow probing of LDAP structure. This issue only affected
Ubuntu 25.10. (CVE-2026-27860)

It was discovered that Dovecot is vulnerable to replay attack under
certain conditions. An attacker could possibly use this issue to bypass
authentication. (CVE-2026-27855)

It was discovered that Dovecot is vulnerable to a timing attack under
certain conditions. An attacker could possibly use this issue to bypass
authentication. (CVE-2026-27856)

It was discovered that Dovecot incorrectly handled certain IMAP login
requests. An attacker could possibly use this issue to cause a denial of
service. (CVE-2026-27857)

It was discovered that Dovecot incorrectly handled certain specially
crafted messages. An attacker could possibly use this issue to cause a
denial of service. (CVE-2026-27858)

It was discovered that Dovecot incorrectly handled certain specially
crafted mail messages. An attacker could possibly use this issue to
cause a denial of service. (CVE-2026-27859)

It was discovered that Dovecot incorrectly handles file paths. A attacker
could possibly use this issue to perform a path traversal and obtain or
modify arbitrary files. This issue only affected Ubuntu 22.04 LTS and
Ubuntu 24.04 LTS. (CVE-2026-0394)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 25.10
dovecot-core 1:2.4.1+dfsg1-5ubuntu4.1

Ubuntu 24.04 LTS
dovecot-core 1:2.3.21+dfsg1-2ubuntu6.3

Ubuntu 22.04 LTS
dovecot-core 1:2.3.16+dfsg1-3ubuntu2.7

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-8136-1
CVE-2025-59028, CVE-2025-59031, CVE-2025-59032, CVE-2026-0394,
CVE-2026-24031, CVE-2026-27855, CVE-2026-27856, CVE-2026-27857,
CVE-2026-27858, CVE-2026-27859, CVE-2026-27860

Package Information:
https://launchpad.net/ubuntu/+source/dovecot/1:2.4.1+dfsg1-5ubuntu4.1
https://launchpad.net/ubuntu/+source/dovecot/1:2.3.21+dfsg1-2ubuntu6.3
https://launchpad.net/ubuntu/+source/dovecot/1:2.3.16+dfsg1-3ubuntu2.7